Comprehensive Guide to Intelligence Gathering and Penetration Testing Stages

 
Intelligence Gathering
 
Stages of penetration testing
 
Gathering information
Scanning
Exploitation
Reporting
 
Intelligence Gathering
 
Intelligence gathering is an important aspect of security
Threats are inevitable and your own systems could be a threat
Only do this on your own systems!
 
nslookup
 – name server lookup, looks for name server information
 
 
inurl:login.htm
 
Google Dork 
:  intitle:"index of" ".pem“
 
inurl: "index.php?id=“
 
inurl:index of driver.php?id=
 
inurl:"/wp-content/wpclone-temp/wpclone_backup/“
 
"PHP Version" inurl:/php/phpinfo.php
 
 
http://www.icreate3dmodelling.co.uk/wp-
content/wpclone-temp/wpclone_backup/
 
Downloadable database
 
inurl:login intext:"reset your password"
 
https://www.exploit-db.com/google-hacking-database
Slide Note
Embed
Share

Understanding the importance of intelligence gathering in security and the stages of penetration testing - information gathering, scanning, exploitation, and reporting. Delve into tools like nslookup for server information and leverage Google Dorks for database vulnerabilities. Safeguard your systems against threats with insightful techniques and practices.

  • Intelligence Gathering
  • Penetration Testing
  • Security
  • Google Dorks
  • Threats

Uploaded on Sep 14, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Intelligence Gathering

  2. Stages of penetration testing Gathering information Scanning Exploitation Reporting

  3. Intelligence Gathering Intelligence gathering is an important aspect of security Threats are inevitable and your own systems could be a threat Only do this on your own systems! nslookup name server lookup, looks for name server information

  4. https://www.exploit-db.com/google-hacking-database inurl:login.htm Downloadable database Google Dork : intitle:"index of" ".pem http://www.icreate3dmodelling.co.uk/wp- content/wpclone-temp/wpclone_backup/ inurl: "index.php?id= inurl:index of driver.php?id= inurl:login intext:"reset your password" inurl:"/wp-content/wpclone-temp/wpclone_backup/ "PHP Version" inurl:/php/phpinfo.php

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#